Literature Database

AdaDoS: Adaptive DoS Attack via Deep Adversarial Reinforcement Learning in SDN

Authors: Wei Shao, Yuhao Wang, Rongguang He, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-10-23
DoS Mitigation
Network Threat Detection
Model DoS

HHEML: Hybrid Homomorphic Encryption for Privacy-Preserving Machine Learning on Edge

Authors: Yu Hin Chan, Hao Yang, Shiyu Shen, Xingyu Fan, Shengzhe Lyu, Patrick S. Y. Hung, Ray C. C. Cheung | Published: 2025-10-23
Privacy-Preserving Machine Learning
暗号化アルゴリズム
Encryption Technology

Beyond Text: Multimodal Jailbreaking of Vision-Language and Audio Models through Perceptually Simple Transformations

Authors: Divyanshu Kumar, Shreyas Jena, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-10-23
Model Robustness
Large Language Model
攻撃手法評価

SAID: Empowering Large Language Models with Self-Activating Internal Defense

Authors: Yulong Chen, Yadong Liu, Jiawen Zhang, Mu Li, Chao Huang, Jie Wen | Published: 2025-10-23
Prompt Injection
Model Robustness
Large Language Model

LLMs can hide text in other text of the same length

Authors: Antonio Norelli, Michael Bronstein | Published: 2025-10-22 | Updated: 2025-10-27
Privacy Protection
Prompt validation
教育目的の情報提供

The Tail Tells All: Estimating Model-Level Membership Inference Vulnerability Without Reference Models

Authors: Euodia Dodd, Nataša Krčo, Igor Shilov, Yves-Alexandre de Montjoye | Published: 2025-10-22
Privacy-Preserving Machine Learning
Model Robustness
Low-Cost Membership Inference Method

Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems

Authors: Mohamed ElShehaby, Ashraf Matrawy | Published: 2025-10-22
Network Threat Detection
Model Robustness
Certified Robustness

CircuitGuard: Mitigating LLM Memorization in RTL Code Generation Against IP Leakage

Authors: Nowfel Mashnoor, Mohammad Akyash, Hadi Kamali, Kimia Azar | Published: 2025-10-22
Privacy-Preserving Machine Learning
Prompt leaking
Causes of Information Leakage

Can You Trust What You See? Alpha Channel No-Box Attacks on Video Object Detection

Authors: Ariana Yi, Ce Zhou, Liyang Xiao, Qiben Yan | Published: 2025-10-22
Platform Architecture
Model Robustness
Research Methodology

Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation

Authors: Chengcan Wu, Zhixin Zhang, Mingqian Xu, Zeming Wei, Meng Sun | Published: 2025-10-22
Indirect Prompt Injection
エージェント設計
Network Threat Detection